User profiles for I-Hsien Liu

I-HSIEN LIU

National Cheng Kung University
Verified email at cans.ee.ncku.edu.tw
Cited by 348

An authentication information exchange scheme in WSN for IoT applications

SK Yang, YM Shiue, ZY Su, IH Liu, CG Liu - IEEE access, 2020 - ieeexplore.ieee.org
Recently, in IoT, wireless sensor network has become a critical technology with which many
applications in industries and human life can achieve smart IoT control. However, for those …

Secure content-based image retrieval in the cloud with key confidentiality

JS Li, IH Liu, CJ Tsai, ZY Su, CF Li, CG Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Owing to the rapid development of cloud services and personal privacy demand, secure
cloud storage services and search over encrypted datasets have become an important issue. …

Defending cloud computing environment against the challenge of DDoS attacks based on software defined network

SC Tsai, IH Liu, CT Lu, CH Chang, JS Li - Advances in Intelligent …, 2017 - Springer
With the explosive growth of cloud computing, virtualization technology has become more
and more mature. However, it also increases the complexity of the network topology and …

Idiopathic intracranial hypertension: clinical features in Chinese patients

IH Liu, AG Wang, MY Yen - Japanese journal of ophthalmology, 2011 - Springer
Purpose To describe the clinical features and visual outcomes of idiopathic intracranial
hypertension (IIH) in Chinese patients. Methods We retrospectively reviewed the charts of …

[HTML][HTML] Cyber security in a 5g-based smart healthcare network: A base station case study

MH Lee, IH Liu, HC Huang, JS Li - Engineering Proceedings, 2023 - mdpi.com
5G is transforming the healthcare industry by providing novel use cases and applications.
With a lower latency, a higher bandwidth, and massive machine-type communication …

Novel intrusion prediction mechanism based on honeypot log similarity

CB Jiang, IH Liu, YN Chung… - International Journal of …, 2016 - Wiley Online Library
The current network‐based intrusion detection systems have a very high rate of false alarms,
and this phenomena results in significant efforts to gauge the threat level of the anomalous …

Utilizing Blockchain to Monitor the Functioning of Devices in Industrial Control Systems

IH Liu, CH Wu, JS Li, CF Li - Journal of Advances in Artificial Life …, 2023 - jstage.jst.go.jp
Programmable logic controllers, or PLCs for short, is ubiquitous in the field of industrial
automation. These devices are used to control and monitor a variety of processes related to …

[HTML][HTML] Anomaly Detection on Network Traffic for the Healthcare Internet of Things

HC Huang, IH Liu, MH Lee, JS Li - Engineering Proceedings, 2023 - mdpi.com
The Internet of Things (IoT) has revolutionized technologies in society, including in households,
offices, factories, and health centers. Among these, the Healthcare Internet of Things (…

K‐anonymity against neighborhood attacks in weighted social networks

CG Liu, IH Liu, WS Yao, JS Li - Security and Communication …, 2015 - Wiley Online Library
Nowadays, with the advance of Internet technology, social network is getting popular, which
combines the virtual network and the real world. People employ this network to …

Necrotizing retinitis induced by Angiostrongylus cantonensis

IH Liu, YM Chung, SJ Chen, WL Cho - American journal of ophthalmology, 2006 - Elsevier
PURPOSE: To describe a case of bilateral necrotizing retinitis induced by Angiostrongylus
cantonensis. DESIGN: Interventional case report. METHODS: A 52-year-old Asian woman …